In the Linux kernel, the following vulnerability has been resolved:
selinux: fix double free of cond_list on error paths
On error path from cond_read_list() and duplicate_policydb_cond_list()
the cond_list_destroy() gets called a second time in caller functions,
resulting in NULL pointer deref. Fix this by resetting the
cond_list_len to 0 in cond_list_destroy(), making subsequent calls a
noop.
Also consistently reset the cond_list pointer to NULL after freeing.
[PM: fix line lengths in the description]
References
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 07:33
Type | Values Removed | Values Added |
---|---|---|
References | () https://git.kernel.org/stable/c/186edf7e368c40d06cf727a1ad14698ea67b74ad - Patch | |
References | () https://git.kernel.org/stable/c/70caa32e6d81f45f0702070c0e4dfe945e92fbd7 - Patch | |
References | () https://git.kernel.org/stable/c/7ed9cbf7ac0d4ed86b356e1b944304ae9ee450d4 - Patch | |
References | () https://git.kernel.org/stable/c/f446089a268c8fc6908488e991d28a9b936293db - Patch |
19 Aug 2024, 17:03
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.8 |
CPE | cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | |
First Time |
Linux
Linux linux Kernel |
|
CWE | CWE-415 | |
Summary |
|
|
References | () https://git.kernel.org/stable/c/186edf7e368c40d06cf727a1ad14698ea67b74ad - Patch | |
References | () https://git.kernel.org/stable/c/70caa32e6d81f45f0702070c0e4dfe945e92fbd7 - Patch | |
References | () https://git.kernel.org/stable/c/7ed9cbf7ac0d4ed86b356e1b944304ae9ee450d4 - Patch | |
References | () https://git.kernel.org/stable/c/f446089a268c8fc6908488e991d28a9b936293db - Patch |
20 Jun 2024, 12:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-06-20 12:15
Updated : 2024-11-21 07:33
NVD link : CVE-2022-48740
Mitre link : CVE-2022-48740
CVE.ORG link : CVE-2022-48740
JSON object : View
Products Affected
linux
- linux_kernel
CWE
CWE-415
Double Free